Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

Digital-Forensics-in-Cybersecurity Exam Dumps - Digital Forensics in Cybersecurity (D431/C840) Course Exam

Go to page:
Question # 17

Which policy is included in the CAN-SPAM Act?

A.

Email sender must provide a method for recipients to opt out of future emails without charge

B.

Email sender must encrypt all outgoing emails

C.

Email sender must verify the recipient’s consent before sending

D.

Email sender must include recipient IP address in the email header

Full Access
Question # 18

Which tool can be used to make a bit-by-bit copy of a Windows Phone 8?

A.

Forensic Toolkit (FTK)

B.

Data Doctor

C.

Pwnage

D.

Wolf

Full Access
Question # 19

Which file system is supported by Mac?

A.

NTFS

B.

EXT4

C.

Hierarchical File System Plus (HFS+)

D.

FAT32

Full Access
Question # 20

Which technique allows a cybercriminal to hide information?

A.

Steganalysis

B.

Steganography

C.

Encryption

D.

Cryptography

Full Access
Question # 21

Which tool identifies the presence of steganography?

A.

Disk Investigator

B.

DiskDigger

C.

Forensic Toolkit (FTK)

D.

ComputerCOP

Full Access
Question # 22

Thomas received an email stating he needed to follow a link and verify his bank account information to ensure it was secure. Shortly after following the instructions, Thomas noticed money was missing from his account.

Which digital evidence should be considered to determine how Thomas' account information was compromised?

A.

Email messages

B.

Browser cache

C.

Bank transaction logs

D.

Firewall logs

Full Access
Go to page: